Essay on Data Protection

Nowadays the right product or service is no longer the key to success, nor are the money, resources or skills. Nowadays the most precious asset in each business is INFORMATION. Information is generated from proper data, therefore the data security and protection is a crucial issue for all organizations - no matter whether talking in the business, politics, military context, no matter - macro on micro scale. A proper data protection is a very important but also very complex process. We may distinguish six basic issues that need to be considered when implementing a proper data security system.

1.Physical protection
Rooms:

Separated room with limited access and strengthened door (for instance with a tin ware). The entrance should be equipped with alarm system. The only people that have an access to the data should be: administrator, employees responsible for data processing and possibly people accompanied by the authorized people. All devices as well as informatic systems used for data processing, supplied with electric power, have to be secured from data loss caused by power damages or interruption. Data processing stations should be obligatory supported with uninterruptible power supply (UPS). Power and Charging Units should be equipped with supertension filter.

Safes:

Incombustible cabinets used for warehousing and storage of optical and magnetooptical carriers are integral part of each and every data protection system. This kind of cabinet is a physical protection of the carriers from water, gas and fire treatments as well as from unauthorized people. It also assures the proper humidity and temperature.
Access keys:

The point of process of authorization in most of the cases is possession of the proper identifier and the password, but there also exist systems based on hardware solutions. This kind of solutions are much safer method of authorization, because identifiers with passwords are usually not properly secured by the users. One of the main users’ "sins" is that they write down their passwords on the little post-it notes on the computer screen. Another common one is that the users commit creation of passwords from simple dates or words that are easy to associate with the user. Equipment solutions give much more possibilities of security form undesirable access. The solution that is used most often is special access key that is being connected to input/output interface in the computer. The application of authorization as a physical unique element increases substantially the safety of the whole system. It is crucial to remember that the loss of confidentiality of identificator and the password is the most often cause of somebody else braking into a computer system.

2.Archivization

Methods and frequency of making emergency copies:

Making emergency copies is a part of Security Administrator duties, and it should be performed in a strict accordance to set schedule. Special attention should be put to the marking of the carriers and its compatibility with the marking in the schedule. The process of making copies should be performed on a daily basis.

The data on the carriers should not be overwritten more often than once in 14 days.
Once a month one carrier with an emergency copy of backup level 0 should be stored in archives together with a proper note in Emergency Backup Journal (or other suitable protocol). Fields in the protocol that have to be filled obligatory are: date of realization, signature of the person controlling propriety of the process, unique carrier marking. Each time a carrier is gathered from the place of its storage as well as each remission of data must be noted in the protocol. The carriers stored in the archives can be remitted for normal use after one calendar year.

Related Documents: Essay on Data Protection

1.1: List the aspects of employment covered by law
The aspects of employment covered by law can be divided into four different sections. They are:-
1. Health and safety at work act 1974
2. Data protection 1998
3. Employment rights and responsibilities 1996
4. Pay and pensions
1.2: List the main features of current employment legislation
Health and Safety at Work Act 1974
The Health and safety acts main feature is to provide a framework for ensuring the health and safety of all employees…

The Data Protection Act 1998 was introduced to keep all personal and confidential data protected from unauthorised subjects. The aim was also to protect the rights and privacy of individuals such as those in a hospital, care home or nursing home along with other businesses unrelated to health and social care. Data can be viewed by unauthorized persons through computers that are not password protected; filing…

Workplace Legislation
In this report I will be explaining about Workplace Legislation information, covering topics such as Equal Opportunities, Data Protection, Health & Safety and Environmental Issues. I will include my findings from research, a conclusion and Finally covering my information Sources.
Equal Opportunities
What is meant by diversity and why it should be valued?
During my findings I discovered that Diversity can be defined as differences in heritage, race, beliefs,…

Data protection act 1998
This law is there so people cannot upload data about other people if they don’t want their data to be shown on the internet, paperwork or any other sort a system where you can store things on. Moreover this law covers all personal data such as: address, email, address, telephone number etc.
This law covers: if someone collects information about you for a particular reason, they cannot then use it for another reason for example someone collects your bank details so they can…

information on a computer that isn’t yours without permission from the owner.
Data Protection Act 1998
Personal data should be obtained fairly and lawfully.
You should be made aware of any information collected about you and you should be asked if it is ok for them to take it.
Personal data can only be held only for specified and lawful purposes.
They have to state why they want to collect and store personal information.
Personal data should be adequate, relevant and not excessive for the required purpose…

requested by HMRC for up to three years after the end of the financial year in which they relate.
Q2: What data relating to employees might this organisation want to collect and how will this support HR or L&D practices? (Give two examples of types of data)
The organisation might collate data relating to their employees attendance in order to improve workforce management, collect data for the payroll department and assist HR in providing information about when staff are absent or late for work…

5.1 Evaluate the Internal quality assurance of assessment regarding information management, data protection and confidentiality in relation to the internal quality assurance of assessment.
I believe that records that are essential in the quality assurance may include: training records; records of support to learners; feedback on assessors’ and learners’ performance and monitoring records and background information on staff. I recognise that the IQA process must consider the types of information…

1.5 Data Protection – Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
Grievance – Grievances are dealt with and resolved informally through discussion between the aggrieved employee and their line manager. Grievances are concerns, problems or complaints raised by an employee and must be made in writing. However, before using the grievance procedure it is expected…

Legal
The Data Protection Act : The Data Protection Act (1998) (DPA) is a law which explains the law on how the data of people can be processed. The DPA is the main body of law which outlines how personal data should be protected. The Act was passed so that the UK was in line with the EU data protection directive of 1995. In reality, the DPA enables employees to control the information that a business holds on them. The DPA has eight principles and requires businesses to keep personal information…

3.1 Summarise the main points of legislation and procedures covering confidentiality, data protection and the disclosure of information
1. What does ‘Working Together to Safeguard Children’ say about information sharing?
Effective sharing of information between professionals and local agencies is essential for effective identification, assessment and service provision. Early sharing of information is key to providing effective early help where there are emerging problems. At the other end of…

Words 1334 - Pages 6

* Test names and other trademarks are the property of the respective trademark holders. None of the trademark holders are affiliated with this website.